WeeChat 1.5 Release Candidate 2

CPE Details

WeeChat 1.5 Release Candidate 2
1.5
2019-03-18
18h10 +00:00
2019-03-18
18h10 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:weechat:weechat:1.5:rc2:*:*:*:*:*:*

Informations

Vendor

weechat

Product

weechat

Version

1.5

Update

rc2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-46613 2024-11-09 23h00 +00:00 WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags.
9.8
Critical
CVE-2021-40516 2021-09-05 15h14 +00:00 WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
7.5
High
CVE-2020-9760 2020-03-23 14h39 +00:00 An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
9.8
Critical
CVE-2020-8955 2020-02-12 20h58 +00:00 irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
9.8
Critical
CVE-2017-8073 2017-04-23 13h00 +00:00 WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.
7.5
High